annoying brute force attack attempt using ssh

Łukasz Jagiełło jagiello.lukasz at gmail.com
Thu May 15 11:16:13 UTC 2008


2008/5/15 Scott van Looy <scott at ethosuk.net>:
> May 15 12:04:00 novak sshd[21433]: Connection from 193.239.125.119 port
> 54204
> May 15 12:04:01 novak sshd[21433]: Invalid user style from 193.239.125.119
> May 15 12:04:01 novak sshd[21434]: input_userauth_request: invalid user
> style
> May 15 12:04:03 novak sshd[21433]: Failed password for invalid user style
> from 193.239.125.119 port 54204 ssh2
> May 15 12:04:03 novak sshd[21434]: Received disconnect from 193.239.125.119:
> 11: Bye Bye
>
>
> Lots and lots. Around 1 every 5 seconds.
>
> So I ran
> iptables -A INPUT -s 193.239.125.119 -j DROP
> and was surprised to see them attacks continue
> Ran iptables -L just to make sure my rule was there and it was
> in the end had to use hosts.deny to block the IP
>
> Anyone got any ideas why?

What about policy at INPUT ?


-- 
Łukasz Jagiełło
lukasz<at>jagiello<dot>org




More information about the fedora-list mailing list